Anonymous authentication based on cloud storage for cross-regional vehicles in VANET
暂无分享,去创建一个
[1] Feng Chao. Techniques of Secure Storage for Cloud Data , 2015 .
[2] Wang Xin. Survey on Security in Vehicular Ad Hoc Networks , 2011 .
[3] Jiang Qi. Security Integration of WAPI Based WLAN and 3G , 2010 .
[4] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[5] Zhuo Ma,et al. Security Integration of WAPI Based WLAN and 3G: Security Integration of WAPI Based WLAN and 3G , 2010 .
[6] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[7] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[8] Tao Zhang,et al. Blend-In: A Privacy-Enhancing Certificate-Selection Method for Vehicular Communication , 2009, IEEE Transactions on Vehicular Technology.
[9] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[10] Fu Ra. Survey of Secure Cloud Storage , 2014 .
[11] Pin-Han Ho,et al. On batch verification with group testing for vehicular communications , 2011, Wirel. Networks.
[12] Panagiotis Papadimitratos,et al. On the Performance of Secure Vehicular Communication Systems , 2011, IEEE Transactions on Dependable and Secure Computing.
[13] Boucif Amar Bensaber,et al. Protocol of change pseudonyms for VANETs , 2013, 38th Annual IEEE Conference on Local Computer Networks - Workshops.
[14] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[15] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.